A complete, up-to-date revision of the leading CISSP training resource from the #1 name in IT security certification and training, Shon Harris Fully revised for the latest release of the Certified Information Systems Security Professional exam, this comprehensive, up-to-date resource covers all 10 CISSP exam domains developed by the International... more...

Don't Let the Real Test Be Your First Test! Fully updated for the CEH v8 exam objectives, this practical guide contains more than 650 realistic practice exam questions to prepare you for the EC-Council's Certified Ethical Hacker exam. To aid in your understanding of the material, in-depth explanations of both the correct and incorrect answers are... more...

Don?t Let the Real Test Be Your First Test! Fully updated throughout and featuring new question types, this self-study tool contains more than 1250 realistic practice exam questions covering all 10 CISSP exam domains developed by the International Information Systems Security Certification Consortium (ISC)2. To aid in your understanding of the material,... more...

Technology?s influence on privacy not only concerns consumers, political leaders, and advocacy groups, but also the software architects who design new products. In this practical guide, experts in data analytics, software engineering, security, and privacy policy describe how software teams can make privacy-protective features a core part of product... more...

If you?re involved in cybersecurity as a software developer, forensic investigator, or network administrator, this practical guide shows you how to apply the scientific method when assessing techniques for protecting your information systems. You?ll learn how to conduct scientific experiments on everyday tools and procedures, whether you?re evaluating... more...

Identify and safeguard your network against both internal and external threats, hackers, and malware attacks About This Book: Lay your hands on physical and virtual evidence to understand the sort of crime committed by capturing and analyzing network traffic; Connect the dots by understanding web proxies, firewalls, and routers to close in on your... more...

Cybersecurity Essentials is organized into four parts that cover the four distinct challenges of creating an effective cybersecurity defense: securing the infrastructure, securing devices, securing local networks, and securing the perimeter. Each part begins with a chapter summarizing the fundamental concepts of that challenge, including real-world... more...

Computer viruses—just the thought of your trusty PC catching one is probably enough to make you sick. Thanks to the cyber-sickies who persist in coming up with new strains, there’s a major new cyberattack nearly every day. Viruses sneak in, usually through e-mail. Fortunately, there are ways to inoculate and protect your computer. Computer... more...

Symantec's chief antivirus researcher has written the definitive guide to contemporary virus threats, defense techniques, and analysis tools. Unlike most books on computer viruses, The Art of Computer Virus Research and Defense is a reference written strictly for white hats: IT and security professionals responsible for protecting their organizations... more...